diff options
Diffstat (limited to 'oauthlib/oauth1/rfc5849/endpoints/request_token.py')
-rw-r--r-- | oauthlib/oauth1/rfc5849/endpoints/request_token.py | 19 |
1 files changed, 10 insertions, 9 deletions
diff --git a/oauthlib/oauth1/rfc5849/endpoints/request_token.py b/oauthlib/oauth1/rfc5849/endpoints/request_token.py index 9424b9d..e97c34b 100644 --- a/oauthlib/oauth1/rfc5849/endpoints/request_token.py +++ b/oauthlib/oauth1/rfc5849/endpoints/request_token.py @@ -21,6 +21,7 @@ log = logging.getLogger(__name__) class RequestTokenEndpoint(BaseEndpoint): + """An endpoint responsible for providing OAuth 1 request tokens. Typical use is to instantiate with a request validator and invoke the @@ -47,7 +48,7 @@ class RequestTokenEndpoint(BaseEndpoint): return urlencode(token.items()) def create_request_token_response(self, uri, http_method='GET', body=None, - headers=None, credentials=None): + headers=None, credentials=None): """Create a request token response, with a new request token if valid. :param uri: The full URI of the token request. @@ -98,7 +99,7 @@ class RequestTokenEndpoint(BaseEndpoint): try: request = self._create_request(uri, http_method, body, headers) valid, processed_request = self.validate_request_token_request( - request) + request) if valid: token = self.create_request_token(request, credentials or {}) return resp_headers, token, 200 @@ -123,15 +124,15 @@ class RequestTokenEndpoint(BaseEndpoint): request.realms = request.realm.split(' ') else: request.realms = self.request_validator.get_default_realms( - request.client_key, request) + request.client_key, request) if not self.request_validator.check_realms(request.realms): raise errors.InvalidRequestError( - description='Invalid realm %s. Allowed are %r.' % ( - request.realms, self.request_validator.realms)) + description='Invalid realm %s. Allowed are %r.' % ( + request.realms, self.request_validator.realms)) if not request.redirect_uri: raise errors.InvalidRequestError( - description='Missing callback URI.') + description='Missing callback URI.') if not self.request_validator.validate_timestamp_and_nonce( request.client_key, request.timestamp, request.nonce, request, @@ -146,7 +147,7 @@ class RequestTokenEndpoint(BaseEndpoint): # # Note that early exit would enable client enumeration valid_client = self.request_validator.validate_client_key( - request.client_key, request) + request.client_key, request) if not valid_client: request.client_key = self.request_validator.dummy_client @@ -173,13 +174,13 @@ class RequestTokenEndpoint(BaseEndpoint): # that the realm is now tied to the access token and not provided by # the client. valid_realm = self.request_validator.validate_requested_realms( - request.client_key, request.realms, request) + request.client_key, request.realms, request) # Callback is normally never required, except for requests for # a Temporary Credential as described in `Section 2.1`_ # .._`Section 2.1`: http://tools.ietf.org/html/rfc5849#section-2.1 valid_redirect = self.request_validator.validate_redirect_uri( - request.client_key, request.redirect_uri, request) + request.client_key, request.redirect_uri, request) if not request.redirect_uri: raise NotImplementedError('Redirect URI must either be provided ' 'or set to a default during validation.') |